Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • FAKE CHECK SCAMS: A BLOCK CHAIN BASED DETECTION SOLUTION
  • Badis HAMMI
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED COMMUNICATION
  • Gaurav Prasad1 and Sujay Narayana2
  • Computer Science & Information Technology
  • 1, 1, February, 2011

  • ANALYTICAL STUDY AND SIMULATION FOR PROPAGATION OF ALERTS, CASE OF EMERGENCY VEHICLES IN SMART CITIES
  • Éloi B. KEITA, Pierre-Yves LUCAS
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • A COMPARATIVE STUDY E-COMMERCE DEVELOPMENT METHOD: ADAPTING AN AGILE APPROACH IN MOBILE OCCASION E – COMMERCE SYSTEM
  • Beshair Khalid Alsiddiq and Nor Shahida Mohd Jamail
  • Computer Science & Information Technology
  • Vol 11, No 4, August, 2019

  • INTRANET SECURITY USING A LAN PACKET SNIFFER TO MONITOR TRAFFIC
  • Ogbu N. Henry
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • APPLIANCE RECOGNITION USING A DENSITYBASED CLUSTERING APPROACH WITH MULTIPLE GRANULARITIES
  • Chun-Wei Yen, Yu-Lin Ke,Sheng-Ta Chen, Yi-Chieh Pai, Hung-Chieh Wei, and Wei-Guang Teng
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • OPTIONS TRADING AND HEDGING STRATEGIES BASED ON MARKET DATA ANALYTICS
  • Huang-Ming Chen, Hao-Hsuan Chang
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • QUES-CHAIN: AN ETHEREUM BASED E-VOTING SYSTEM
  • Qixuan Zhang
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • AN IRREGULAR SPATIAL CLUSTER DETECTION COMBINING THE GENETIC ALGORITHM
  • Tao Wang , Yitong Zhao
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • Inspection of Methods of Empirical Mode Decomposition
  • Roberto Hernandez Santander and Esperanza Camargo Casallas
  • Computer Science & Information Technology
  • 9, 11, August, 2019

  • ADAPTING AN AGILE APPROACH IN MOBILE E – COMMERCE
  • Beshair Khalid Alsiddiq
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • THE STATISTICAL ANALYSIS OF THE LIVE TV BIT RATE
  • Iskandar Aripov
  • Computer Science & Information Technology
  • 9, 7, June, 2019

  • SOLVING THE BINARIZATION CHALLENGES IN DOCUMENT IMAGES USING OTSU MULTILEVEL
  • Enas M. Elgbbas
  • Computer Science & Information Technology
  • 9, 7, June, 2019

  • AN APPROACH TO TRACKING PROBLEM FOR LINEAR CONTROL SYSTEM VIA INVARIANT ELLIPSOIDS METHOD
  • Mikhail Khlebnikov
  • Computer Science & Information Technology
  • 9, 7, June, 2019

  • REVIVING LEGACY ENTERPRISE SYSTEMS WITH MICROSERVICE-BASED ARCHITECTURE WITHIN CLOUD ENVIRONMENTS
  • Safa Habibullah , Xiaodong Liu and Zhiyuan Tan
  • Computer Science & Information Technology
  • 9, 7, June, 2019

  • VULNERABILITY ANALYSIS OF IP CAMERAS USING ARP POISONING
  • Thomas Doughty
  • Computer Science & Information Technology
  • 9, 7, June, 2019

  • CADS: CORE-AWARE DYNAMIC SCHEDULER FOR MULTICORE MEMORY CONTROLLERS
  • Eduardo Olmedo Sanchez
  • Computer Science & Information Technology
  • 9, 7, June, 2019

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals